The Apple platform has always been secondary to me in my business. I don't know if it's because there are less of them out there or because they never break. I personally think its the former, having repaired (for much less money and way less attitude than the Apple Geniuses) many an Apple computer.
In the first part of this article, I talked about the physical restrictions that can be placed on a computer, such as its location, time restraints and mobile phones. Today, I'm going to talk more about the software and configuration changes that can limit the dangerous areas that a child can
If you've got kids like I do, then you know the fear and paranoia that come across your mind when your child wants to get on the internet. Today, I thought I would talk about several ways to enforce kid-safe browsing, meaning making the computer stay within your pre-defined limits when it comes to
Recently in the news there has been a lot of talk about Sony's security breach and the loss of many of its users and passwords, including contact information and credit card numbers. Their main suggestion is that people be skeptical of emails asking for account information and that people change